minimaxir / neural-doodle
Turn your two-bit doodles into fine artworks with deep neural networks, generate seamless textures from photos, transfer style from one image to another, perform example-based upscaling, but wait... there's more! (An implementation of Semantic Style Transfer.)
☆11Updated 8 years ago
Alternatives and similar repositories for neural-doodle:
Users that are interested in neural-doodle are comparing it to the libraries listed below
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 9 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆37Updated 7 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Updated 8 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆45Updated 9 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆26Updated 7 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 8 years ago
- Suite for Information gathering☆12Updated 6 years ago
- Identifies phishing websites using a treebag model☆22Updated 4 years ago
- Network Forensics Workshop Files☆17Updated 9 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆16Updated 9 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- Automatically scans for malicious proxies.☆29Updated 9 years ago
- Honeypot for router backdoor (TCP 32764)☆17Updated 10 years ago
- Source codes related to the articles about OSINT. Using social media APIs and Python language.☆22Updated 6 years ago
- Machines created to speed up analysis inside of Maltego☆16Updated 8 years ago
- An old penetration testing application.Updated 2 years ago
- ☆20Updated 7 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆18Updated 10 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆10Updated 10 years ago
- ☆63Updated 9 years ago
- A tool for collecting compromised email address☆9Updated 9 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Updated 10 years ago
- collection of python scripts to capture dns traffic and store it in elasticsearch☆8Updated 3 years ago
- Scrapes the web for reliable http or https proxies and prints them to stdout. Can also be used as a python library to easily generate rel…☆34Updated 5 years ago
- The Zonefile Transfer Toolkit☆28Updated 2 weeks ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- hemingway is a simple and easy to use spear phishing helper.☆39Updated 8 years ago
- WAF bypass toolkit☆9Updated 9 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago